|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2017-9445: systemd-resolved: possible out-of-bounds write triggered by a specially crafted TCP payload from a DNS Server | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Victor Pereira <vpereira> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Major | ||
| Priority: | P3 - Medium | CC: | abergmann, fbui, meissner, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | CVSSv2:SUSE:CVE-2017-9445:6.8:(AV:N/AC:M/Au:N/C:P/I:P/A:P) CVSSv3:SUSE:CVE-2017-9445:8.8:(AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSSv3:RedHat:CVE-2017-9445:7.5:(AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSSv3:NVD:CVE-2017-9445:7.5:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSSv2:NVD:CVE-2017-9445:5.0:(AV:N/AC:L/Au:N/C:N/I:N/A:P) | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Victor Pereira
2017-06-21 08:32:13 UTC
CRD: 2017-06-27 15:00 UTC Ok looks like we had a good idea to not ship resolved so far ;) Marcus, since resolved in not shipped by any (open)SUSE distro, should we still address this issue right now or can we wait until the fix is pushed upstream ? if we are not shipping it, the bug can be fixed when it appears upstream Ok then let's wait for the fix to reach upstream and I'll backport it just in case we will enabled resolved in the future. is now public. public at http://seclists.org/oss-sec/2017/q2/618 Certain sizes passed to dns_packet_new can cause it to allocate a buffer that's too small. A page-aligned number - sizeof(DnsPacket) + sizeof(iphdr) + sizeof(udphdr) will do this - so, on x86 this will be a page-aligned number - 80. Eg, calling dns_packet_new with a size of 4016 on x86 will result in an allocation of 4096 bytes, but 108 bytes of this are for the DnsPacket struct. A malicious DNS server can exploit this by responding with a specially crafted TCP payload to trick systemd-resolved in to allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it. Discoverer believes this was introduced by https://github.com/systemd/systemd/commit/a0166609f782da91710dea9183d1bf138538db37 Upstream: https://github.com/systemd/systemd/pull/6214 https://github.com/systemd/systemd/commit/980cb558dc0293cc387597581a130542754195a0 Thanks for the notification. The fix has been backported to the affected versions (v228, v233) so this bug can be closed. Please note that none of the openSUSE or SUSE distros are affected since systemd-resolved is not shipped. SUSE-SU-2017:1898-1: An update that solves one vulnerability and has 8 fixes is now available. Category: security (important) Bug References: 1032029,1033238,1037120,1040153,1040968,1043900,1045290,1046750,986216 CVE References: CVE-2017-9445 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP2 (src): systemd-228-150.7.1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): dracut-044.1-109.8.3, systemd-228-150.7.1 SUSE Linux Enterprise Server 12-SP2 (src): dracut-044.1-109.8.3, systemd-228-150.7.1 SUSE Linux Enterprise Desktop 12-SP2 (src): dracut-044.1-109.8.3, systemd-228-150.7.1 OpenStack Cloud Magnum Orchestration 7 (src): dracut-044.1-109.8.3, systemd-228-150.7.1 openSUSE-RU-2017:1981-1: An update that has 9 recommended fixes can now be installed. Category: recommended (important) Bug References: 1032029,1033238,1037120,1040153,1040968,1043900,1045290,1046750,986216 CVE References: Sources used: openSUSE Leap 42.2 (src): dracut-044.1-16.9.2, systemd-228-25.9.1, systemd-mini-228-25.9.1 openSUSE-RU-2017:1982-1: An update that has 11 recommended fixes can now be installed. Category: recommended (important) Bug References: 1032029,1032284,1033238,1037120,1040153,1040968,1043900,1045290,1046750,1048565,986216 CVE References: Sources used: openSUSE Leap 42.3 (src): dracut-044.1-23.2, systemd-228-29.1, systemd-mini-228-29.1 SUSE-SU-2017:2031-1: An update that solves two vulnerabilities and has 17 fixes is now available. Category: security (moderate) Bug References: 1004995,1029102,1029516,1032029,1033238,1036873,1037120,1038865,1040153,1040258,1040614,1040942,1040968,1043758,1043900,1045290,1046750,982303,986216 CVE References: CVE-2017-9217,CVE-2017-9445 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP3 (src): systemd-228-150.9.3 SUSE Linux Enterprise Server 12-SP3 (src): systemd-228-150.9.3 SUSE Linux Enterprise Desktop 12-SP3 (src): systemd-228-150.9.3 released (even if not enabled) |